6 - Single-Region Hub and Spoke Virtual Network with Azure Firewall
A full platform landing zone deployment with hub and spoke Virtual Network connectivity using Azure Firewall in a single region.
The single region option is here for completeness, we recommend always having at least 2 regions to support resiliency.
- Example Platform landing zone configuration file: full-single-region/hub-and-spoke-vnet.tfvars
The following resources are deployed by default in this scenario:
- Management Groups
- Policy Definitions
- Policy Set Definitions
- Policy Assignments
- Policy Assignment Role Assignments
- Log Analytics Workspace
- Log Analytics Data Collection Rules for AMA
- User Assigned Managed Identity for AMA
- Automation Account
- DDOS Protection Plan
- Hub virtual network in one region
- Subnets for Firewall, Gateway, Bastion, and Private DNS Resolver in one region
- Azure Route table for Firewall in one region
- Azure Route table for other subnets and spokes in one region
- Azure Firewall in one region
- Azure Firewall public IP in one region
- Azure Firewall policy in one region
- Azure Bastion in one region
- Azure Bastion public ip in one region
- Azure Private DNS Resolver in one region
- Azure non-regional Private Link Private DNS zones in one region
- Azure regional Private Link Private DNS zones in one region
- Azure Virtual Machine auto-registration Private DNS zone in one region
- Azure Private Link DNS zone virtual network links in one region
- Azure ExpressRoute Virtual Network Gateway in one region
- Azure VPN Virtual Network Gateway in one region
The following relevant configuration is applied:
Private DNS is configured ready for using Private Link and Virtual Machine Auto-registration. Spoke Virtual Networks should use the Azure Firewall IP Address as their DNS configuration.
- Azure Firewall is configured as DNS proxy
- Azure Firewall forwards DNS traffic to the Private DNS resolver
- Azure Private DNS Resolver has an inbound endpoint from the hub network
- Azure Private Link DNS zones are linked to the all hub Virtual Networks
Route tables are pre-configured for spoke virtual networks in one region. Assign the user subnet route table to any subnets created in spokes.
- Azure Firewall in one region as next hop in Route Table